J-Security Center

Title: FireFTP 'MLSD' And 'LIST' Commands Directory Traversal Vulnerability

Severity: HIGH


FireFTP is an FTP client for Mozilla Firefox.

FireFTP is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data.

A remote attacker could exploit this vulnerability using directory-traversal strings (such as '../') to write arbitrary files to locations outside of the FTP client's current directory. Specifically, the 'parseListData()' function in the 'content/js/connection/controlSocket.js.in' script fails to sanitize filenames. The attacker can exploit this issue by hosting a malicious FTP server and sending crafted responses to 'MLSD' and 'LIST' commands. Successful exploits could help the attacker launch further attacks.

NOTE: Files uploaded to the 'C:\Documents and Settings\All Users\Start Menu\Programs\Startup' directory will automatically be processed when the computer is rebooted. This could result in a compromise.

FireFTP 0.97.1 is vulnerable; other versions may also be affected.

Affected Products:

  • FireFTP FireFTP 0.97.1


Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.